other Flashcards
(22 cards)
what is forensic art?
Art used in conjunction with legal procedures -
used for:
- the identification, apprehension or conviction of offenders
- the location of victims
- identification of unknown deceased persons
4 guidlines of facial identification compositions (as stated in ACPO guidlines section 4.1.1)
- any notes and sketches produced during the production of an image are subject to disclosure.
- final composite must be signed and dates by both the witness and practitioner.
- declaration must be attached tot the composite image to warn handlers that any editing or altering of the composite is tampering with evidence.
- signed and dated sompositions become exhibits.
what are the main forensic art techniques used in the UK?
- composite facial sketching
- facial reconstruction
- age progression
- crime scene illustration
- injury depiction
brief description of the forensic art technique: composite facial sketching
This involves interviewing witnesses to gather information about a suspect’s appearance and then creating a composite drawing that incorporates those features.
brief description of the forensic art technique: facial reconstruction
This technique is used to recreate the facial features of a deceased person, often from skeletal remains or 3D scans.
brief description of the forensic art technique: age progression
This technique helps visualize how an individual’s appearance may change over time, aiding in the location of missing persons or the identification of potential suspects.
brief description of the forensic art technique: crime scene illustration
detailed sketches and illustrations of crime scenes, helping investigators understand the layout and identify evidence relationships.
brief description of the forensic art technique: injury depiction
artistic documentation of injuries, helping to compare medical reports with witness descriptions and provide a visual record of trauma.
how to calculate corresponding compression ratio of an image
divide the original file size (uncompressed) by the compressed file size (then put answer in front of :1 ).
how many bits in a byte
8
convert byte to kbyte
divide by 1000
what is a JPEG ghost?
a visual artifact that can appear in JPEG images, especially when an image has been manipulated or spliced
how are JPEG ghosts detected?
By analysing the DCT (Discrete Cosine Transform) coefficients of a JPEG image, the presence of different compression qualities can be identified and the manipulated region can be localized
What is the transformation method used in JPEG image
compression?
DCT - Discrete cosine transformation
How does discrete cosine transformation work?
This method converts the image from its spatial representation (pixel values) to a frequency domain representation. This allows for the identification and discarding of less important high-frequency components, reducing file size without significantly impacting perceived image quality.
what is the difference between pure steganography and secret key steganography?
Explain the difference between pure steganography and secret key
steganography
what is cryptanalysis?
cryptanalysis is the process of deciphering a code without being given a key.
what is a common hashing algorithm/function? and what are three key properties for the output?
SHA-1
three key properties:
- fixed length
- digest unique to data message
- impossible to recover original message from message digest alone.
what is a symmetric key?
the same key is used for both encryption and decryption
what is an asymmetric key?
the key for encryption is different to the one used for encryption.
how do vigenere cyphers work?
encryption:
1. line up the key under the message so the letters line up (if message is longer than key repeat the key until the end of the message).
2. change the letters for the numbers, numbering them using the placement of the numbers in the alphabet (A = 0).
3. add numbers together. if number above 25, minus 25.
decryption:
do the same but minus the numbers of the keyword from the numbers in the encrypted text.
how does the transposition method work for encrypting and decrypting a message?
Encryption:
1. assign the keyword numbers according to the order they appear in the alphabet.
2. write the message beneath he keyword, lining up the letters and ignoring spaces.
3. write the letters out in the order of the numbers in the keyword.
decryption:
do this backwards.